Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: SuSE Local Security Checks --> Category: infos

SUSE-SA:2006:005: nfs-server Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the nfs-server package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory SUSE-SA:2006:005 (nfs-server).

An remotely exploitable problem exists in the rpc.mountd service in
the user space NFS server package 'nfs-server'.

Insufficient buffer space supplied to the realpath() function
when processing mount requests can lead to a buffer overflow in
the rpc.mountd and allows remote attackers to execute code as the
root user.

Code execution is definitely possible if the attacker can create
symlinks on any of the file systems on the machine running rpc.mountd
(/tmp , /home/attacker or similar).
For attackers without filesystem access code execution is potentially

The 'nfs-server' package is obsolete and has been replaced by the
'nfs-utils' package (kernel NFS server) in all currently supported
SUSE Linux products already and is only included for completeness.
The 'nfs-utils' package itself is NOT affected by this problem.

This issue is tracked by the Mitre CVE ID CVE-2006-0043.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.